Installation:Open your terminal, type the command to run gedit(or other editor in your opinion) to modify the sources.list: sudo gedit /etc/apt/sources.list
And put the two line into it:deb http://ppa.launchpad.net/tualatrix/ubuntu hardy maindeb-src http://ppa.launchpad.net/tualatrix/ubuntu hardy main
Then update the source and install or upgrade Ubuntu Tweak:sudo apt-get updatesudo apt-get install ubuntu-tweakif you have installed, just type:sudo apt-get dist-upgradeDownload:Here

Yesterday, the Open Source community took an emotional hit when veteran Linux programmer Hans Reiser was convicted of first degree murder in the suspicious disappearing of his wife, Nina. While I won’t go into the details of the case, as this has been covered extensively in the press, I would like to talk a little bit about how this verdict will impact the technology in play for file system dominance in our favorite Open Source operating system, Linux.

Suse and Debian use ReiserFS version 3, a stable and proven version of the code that has been sitting mostly fallow for some time, and is maintained with bug and security fixes on a best effort basis.

From the SuSE and Debian perspective, this is an obviously unacceptable state of affairs. The OpenSuSE project has already moved its distribution to use the ext3 file system

Spectois aOpenSource WebPage update/monitoring program - it saves you time and keeps you updated by automatically checking web pages (static or dynamic)to see if they have changed also helps to check it at time when someone is trying to change your page.

You can configure Specto to monitor changes to wiki pages, blog posts, forum threads, your email inbox, and even files and folders on your own system. An unobtrusive pop-up from its system tray icon informs you of all changes, so you don't have to hop around looking for updates.

You can install it from the compressed tarball if you want the most recent release. First explode the tarball with the tar zxvf specto-0.2.2.tar.gz command. Next, browse into the specto-0.2.2/ directory. You don't have to install Specto to begin using it; the command ./launch.sh launches Specto. But Fedora and Ubuntu users can respectively use the su -c "python setup.py install" or sudo python setup.py install command to install Specto.

Workaholic is a program which shows a window to remind you to take a break after a period of time by showing a transparent window with a progress bar. You can skip rests, or postpone these for 5 or 10 minutes.

The typical computer user interacts with a number of different resources and programs on her computer, all of which are accessed by disparate means, including menus, location bars, icons, shortcut keys, etc. We plan to consolidate these interfaces by creating an application that indexes items in the user's desktop environment (documents, contacts, bookmarks, applications, multimedia, etc.) and lets the user search through these items and manipulate these items with commonly performed actions (open, run, email, chat, etc.).

SystemRescueCd is a Linux system on a bootable CD-ROM for repairing your system and recovering your data after a crash. It aims to provide an easy way to carry out admin tasks on your computer, such as creating and editing the partitions of the hard disk. It contains a lot of system utilities (parted, partimage, fstools, ...) and basic tools (editors, midnight commander, network tools). It is very easy to use: just boot the CDROM. The kernel supports most of the important file systems (ext2/ext3, reiserfs, reiser4, xfs, jfs, vfat, ntfs, iso9660), as well as network filesystems (samba and nfs).

BlueProximity is software helps you add a little more security to your desktop. It does so by detecting one of your bluetooth devices, most likely your mobile phone, and keeping track of its distance. If you move away from your computer and the distance is above a certain level (no measurement in meters is possible) for a given time, it automatically locks your desktop (or starts any other shell command you want).

Once away your computer awaits its master back - if you are nearer than a given level for a set time your computer unlocks magically without any interaction (or starts any other shell command you want).

A simple KDE network monitor that show rx/tx LEDs or numeric information about the transfer rate of any network interface in a system tray icon. KNetStats is now part of kde-extragear package so the source code can be found at the KDE subversion repository. Stable releases packages are avaliable to download also at SourceForge download servers. The current version is v1.6.1.

Here's a quick example of how to run a program on a Linux system through a crontab entry, with the program being executed as the user nobody.

Just put this entry in a crontab file (by issuing the "crontab -e" command, for example), and the program named myProgram.sh will be run at 1:30 a.m. using the Bourne shell, and will be run as the user nobody.

So you want to log off and go home for the night, but you need to run a job that's going to take a couple of hours? Fear not, the nohup command will help you out.

As a simple example, assume that you have a command named RunningJob.sh that you want to run, but you know if will take over three hours to run. Just submit the job using the nohup ("no hang up") command as shown below, and you should be good to go:

nohup myLongRunningJob.sh &

Of course make sure you test your program to know that it is really set up properly, otherwise you'll be in for a disappointment in the morning. Other than that, if your command is set up properly, the nohup command should do the trick for you. You can safely log out, and find your results waiting for you in the morning.

One of the biggest security holes you could open on your server is to allow directly logging in as root through ssh, because any cracker can attempt to brute force your root password and potentially get access to your system if they can figure out your password.

It's much better to have a separate account that you regularly use and simply sudo to root when necessary. Before we begin, you should make sure that you have a regular user account and that you can su or sudo to root from it.

To fix this problem, we'll need to edit the sshd_config file, which is the main configuration file for the sshd service. The location will sometimes be different, but it's usually in /etc/ssh/. Open the file up while logged on as root.

vi /etc/ssh/sshd_config

Find this section in the file, containing the line with "PermitRootLogin" in it.

BFD is a modular shell script for parsing applicable logs and checking for authentication failures. There is not much complexity or detail to BFD yet and likewise it is very straight-forward in its installation, configuration and usage. The reason behind BFD is very simple; the fact there is little to no authentication and brute force auditing programs in the Linux community that work in conjunction with a firewall or real time facility to place bans. To use BFD you must have APF Firewall installed first.

How To:
Download BFD: wget http://www.r-fx.ca/downloads/bfd-current.tar.gz
[Check here if you want to know how to install the software from source]
After the installation is complete you will receive a message saying it has been installed.
Next we will have to configure the firewall: vi /usr/local/bfd/conf.bfd
Find the following lines and replace them with your details:

Now you should put your ip address to allow hosts so you will not accidentally lock yourself out.vi /usr/local/bfd/ignore.hosts and put your ip address.
Now we are ready to start the BFD system: /usr/local/sbin/bfd –s
For more configuration options you are suggested to read the README.

You should hide php banner information from being displayed so the attackers are not aware of what version of PHP version you are running and thus making it more difficult for them to exploit any system holes and thus making vulnerability scanners work harder and in some cases impossible without knowing banner information.

How To:Modify php.ini Change the expose_php line to: expose_php=OffNotice: You may need to restart Apache.

You should hide apache banner information from being displayed so the attackers are not aware of what version of Apache version you are running and thus making it more difficult for them to exploit any system holes and thus making vulnerability scanners work harder and in some cases impossible without knowing banner information.

SHA-1 is the successor of MD5 ( Read about MD5 here ) is a tool to check the integrity of your downloads.
The SHA-1 algorithm is the brainchild of the US-based National Security Agency (NSA)

Basically it works the same as the MD5, a SHA-1 file is available on the download server where you downloaded your ISOs and when opening it you will see a string of numbers that you compare to the output of the command:

CODE: $ sha1sum /home/Nikesh/downloaded.iso

The string you get from this command typically looks like:

QUOTEf560f26a32820143e8286afb188f7c36d905a735

You compare it to the string you find in the SHA-1 file on the download server. If both of them are identical you can be sure your downloaded ISO is okay and you can burn it to a CD.

The login banner is essential to legal actions taken against people who misuse and illegally hack into your box. There have been cases where the hackers got off because the server they hacked into actually “Welcomed” them into the system!

To change the login banner/welcome message, simply edit the /etc/issue file and put whatever you want into this file, best option is to keep it empty.

The pam_smbpass PAM module can be used to sync users' Samba passwords with their system passwords when the passwd command is used. If a user invokes the passwd command, the password the uses to log in to the system as well as the password he must provide to connect to a Samba share are changed.

To enable this feature, add the following line to /etc/pam.d/system-auth below the pam_cracklib.so invocation:

To configure Samba on your Red Hat Linux system to use encrypted passwords, follow these steps:

1. Create a separate password file for Samba. To create one based on your existing /etc/passwd file, at a shell prompt, type the following command:

# cat /etc/passwd | mksmbpasswd.sh > /etc/samba/smbpasswd

If the system uses NIS, type the following command:

# ypcat passwd | mksmbpasswd.sh > /etc/samba/smbpasswd

The mksmbpasswd.sh script is installed in your /usr/bin directory with the samba package.

2. Change the permissions of the Samba password file so that only root has read and write permissions:

# chmod 600 /etc/samba/smbpasswd

3. The script does not copy user passwords to the new file, and a Samba user account is not active until a password is set for it. For higher security, it is recommended that the user's Samba password be different from the user's Red Hat Linux password. To set each Samba user's password, use the following command (replace username with each user's username):

# smbpasswd username

4. Encrypted passwords must be enabled in the Samba configuration file. In the file smb.conf, verify that the following lines are not commented out:

encrypt passwords = yes smb passwd file = /etc/samba/smbpasswd

5. Make sure the smb service is started by typing the command service smb restart at a shell prompt.

In this example we will fdisk the disk attached to our 2nd array controller.

1. fdisk the new drive
* fdisk /dev/sda
* Make a new partition using fdisk (/dev/sda1)

2. format the new partition using mkfs
* mkfs -t ext3 /dev/sda1
* Note, if you will be storing lots of small files, you may need to increase the inode count. You do this when you format the drive. The default count of inodes will be good for most people.

3. Make a new directory to mount your new space to
* mkdir /newspace
* Note: If moving a current filesystem over to this new space, you will need to first mount the new space to a temporary mount point, move all the contents to it, then unmount that temporary mount point, and finally add an entry in /etc/fstab so it will mount automatically on bootup.

4. Have the new drive mount automatically
* vi /etc/fstab
* make a copy of an existing line
* change this new line to match your partition number

5. Test that your partition mounts ok according to the changes you made in /etc/fstab
* mount /dev/sda1 /newspace

You can read the latest release of the underground magazine Phrack from their website. For those among us who are not very familiar with phrack or underground magazine scene. Phrack has been around since 1985, well over 20 years, and has been the leading underground hacking/cracking ezine out there. Some notable facts about phrack (taken from wikipedia):

The Mentor’s Hacker Manifesto, which has been an inspiration to young hackers since the 1980s, was published in the 7th issue of Phrack.

Aleph One’s Smashing The Stack For Fun And Profit, published in issue 49, is the “classic paper” on stack buffer overflows, partly responsible for popularizing the vulnerability.

* Several regular columns are present in most issues of Phrack, such as:
* Prophile - the presentation of a very influential character from the hacking underground.
* Loopback - answers to the most original (or stupid) emails received by the phrack staff.
* Phrack World News - a compilation of reports on the latest counter-culture events.
* International Scene - a compilation of testimonies from hackers all around the world focusing on national and international activities.

BTBrowser - Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification. Download BTBrowser.

BTCrawler -BTCrawler is a scanner for Windows Mobile based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks. Download BTCrawler.

Hacking Bluetooth Devices

BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information. Download BlueBugger.

CIHWB - Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack. Download CIHWB.

Bluediving - Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode. Download Bluediving.

Bluesnarfer - Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data. Download Bluesnarfer.

When Squid is installed and running, it uses port 3128 by default. You should test it manually by setting your HTTP proxy to the server that runs Squid. For instance, in Firefox to go Tools -> Options -> Advanced -> Network -> Settings and enter the IP address or host of the Squid proxy (e.g. 192.168.0.100) and 3128 for the port. Try to load any web page. If you see an access denied error, check out the http_access configuration in the squid configuration file.

Once Squid is all set and ready to go, you need to forward your connection to it over SSH. To set the tunnel up on your Windows laptop, download Plink, a command-line version of Putty SSH client, and run this command:

Sqlninja is a tool to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide a remote shell on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered.

Features:

The full documentation can be found in the tarball and also here, but here's a list of what the Ninja does:

For the 4th year running, Google and O’Reilly will present a set of Open Source Awards at OSCON 2008. The awards recognize individual contributors who have demonstrated exceptional leadership, creativity, and collaboration in the development of Open Source Software. Past recipients for 2005-2007 include Doc Searls, Jeff Waugh, Gerv Markham, Julian Seward, David Heinemeier Hansson, Karl Fogel, David Recordon, and Paul Vixie.

The nomination process is open to the entire open source community, closing May 15th, 2008. Send your nominations to osawards AT oreilly DOT com. Nominations should include the name of the recipient, any associated project/org, suggested title for the award (”Best Hacker”, “Best Community Builder”, etc.), and a description of why you are nominating the individual. Google and O’Reilly employees cannot be nominated.

You can help spread the word for openSUSE 11.0 before it’s released! The openSUSE project now has countdown banners that display the number of days before the next openSUSE release.

You can display the banner on your site, and the rendering is done via the openSUSE server. You can find the code and the right language for your site on http://en.opensuse.org/Countdown. You can link the banner to http://en.opensuse.org/OpenSUSE_11.0 which has information about the 11.0 release and information on testing prior to the final 11.0 release.
The banners were inspired by a post by Pavol Rusnak, and we received fantastic code and graphics contributions from several members of the openSUSE community, including Pascal Bleser, Jakub ‘jimmac’ Steiner, Pavol Rusnak, Marek Stopka, Kevin Dupuy, and Billy Juliani. Thanks to everyone who contributed!
So, grab a banner and show your openSUSE pride.

If you often switch your Linux computer on and off (for example because it is a laptop), it will check the filesystems at boot more often than necessary. Having to wait at unexpected times is annoying, and when this happens every few days and always just when you needed access to your data quickly, even more so.

Having a fixed time interval between these checks (so you know when they will happen) instead of checks happening when a counter reaches some number is much better. Configuring this is quite easy. First, look in /etc/fstab . In my case, the relevant lines are:

The Open Source Census, an effort to pin down hard statistics regarding the implementation of open-source software around the world, gets underway on Wednesday.

Companies and individuals can use the tool to scan their computers for open-source software and then anonymously upload the data to the effort's site. The information will be available in two forms. Those who contribute can get reports summarizing their own use, as well as comparative data based on similar companies' results. Aggregated data untraceable to any company will be available publicly on the site.

LINUX syslogd uses synchronous writes by default, which is very expensive. For services such as mail it is recommended that you disable synchronous logfile writes by editing /etc/syslog.conf and by prepending a ”-” to the logfile name.

Web designer use Flash animation to attract visitor attention, too much flash animation will make people feel annoying. There is this firefox extension Flashblock which able to block flash animation from loading. I’m using this Flash block to block all flash animation. One hand it help to block all annoying flash animation, at other hand it help to speed up page loading.
Get Flashblock from here

Ever been annoyed by all those ads and banners on the internet that often take longer to download than everything else on the page? Install Adblock Plus now and get rid of them and also help you to access the contents faster.

Get Adblock from here and you also need Adblock Filterset.G Updater, This is a companion extension to Adblock or Adblock Plus and should be used in conjunction with it. This extension automatically downloads the latest version of Filterset.G every 4-7 days. Filterset.G is an excellent set of filters maintained by G for Adblock that blocks most ads on the internet.
Get Adblock Filterset.G Updater from here

Here is a website, Opensourceproject.org.cn, that offers 222 freely available online books and tutorial articles covering open source technologies. Most of these are written in English, some are in Chinese. The numbers below refer to the number of English books. These will help you learn how to program in open source languages and frameworks, such as Eclipse, Perl, Ruby, PHP, and Python. These will also help you gain knowledge and increase your skills with Ubuntu Linux, Red Hat Linux, Fedora, Suse Linux, the Linux Kernel, and Embedded Linux.

The Linux Professional Institute (LPI) certifies Linux system administrators at two levels: junior level (also called "certification level 1") and intermediate level (also called "certification level 2"). To attain certification level 1, you must pass exams 101 and 102; to attain certification level 2, you must pass exams 201 and 202.

LPI Exam 101:
These 5 LPI 101 tutorials will assist you in getting ready for taking and passing these topics in the LPI exam 101. Students taking Linux exams in online education classes can also benefit from these tutorials. Exam 101 is the first of two junior-level system administrator exams. Both exam 101 and exam 102 are required for LPIC-1 certification, which is the junior level.

LPI exam 101 prep, Topic 101: Hardware and architecture
In this tutorial (the first in a series of five tutorials), Ian Shields introduces you to configuring your system hardware with Linux, and in doing so, begins preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 101. In this tutorial, you learn how Linux configures the hardware found on a modern PC and where to look if you have problems.

LPI exam 101 prep, Topic 102: Linux installation and package management
In this tutorial (the second in a series of five tutorials), Ian Shields introduces you to Linux installation and package management, and in doing so, continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 101. In this tutorial, you learn how Linux uses disk partitions, how Linux boots, and how to install and manage software packages.

LPI exam 101 prep, Topic 103: GNU and UNIX commands
In this tutorial (the third in a series of five tutorials), Ian Shields introduces you to the Linux command line and several GNU and UNIX commands, and in doing so, continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 101. This tutorial helps you learn to use commands on a Linux system.

LPI exam 101 prep, Topic 104: Devices, Linux filesystems, and the Filesystem Hierarchy Standard
In this tutorial (the fourth in a series of five tutorials), Ian Shields introduces you to Linux devices, filesystems, and the Filesystem Hierarchy Standard, and in doing so, continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 101. This tutorial shows you how to create and format partitions with different Linux filesystems and how to manage and maintain those systems.

LPI exam 101 prep, Topic 110: The X Window System
In this tutorial (the last in a series of five tutorials), Ian Shields introduces you to the X Window System on Linux, and in doing so, continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 101. In this tutorial, you learn how to install and maintain the X Window System. This tutorial covers both major packages for X on Linux: XFree86 and X.Org.

LPI Exam 102:
These 6 LPI 102 tutorials will assist you in in getting ready to pass these topics in the LPI exam 102. Exam 102 is the second of two LPI junior-level system administrator exams. Both exam 101 and exam 102 are required for LPIC-1 certification, which is the junior level. Three missing topics for this exam will be added in the future.

LPI exam 102 prep, Topic 105: Kernel
By the end of this tutorial, you will know how to build, install, and query a Linux kernel and its kernel modules. The tutorial is organized according to the specific objectives of the LPI exam for this topic. If you're studying for certification -- or simply building a solid foundation in Linux systems administration -- you will be ready to proceed to the next tutorial in the exam 102 series.

LPI exam 102 prep, Topic 106: Boot, initialization, shutdown, and runlevels
In this tutorial, Ian Shields continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 102. In this second in a series of nine tutorials, Ian introduces you to startup and shutdown on Linux. By the end of this tutorial, you will know guide a system through booting, set kernel parameters, and shut down or reboot a system.

LPI exam 102 prep, Topic 107: Printing
In this tutorial, the third of a series of nine tutorials on LPI exam 102 topics, Ian Shields introduces you to printing in Linux. By the end of this tutorial, you will know how to manage printers, print queues, and user print jobs on a Linux system.

LPI exam 102 prep, Topic 108: Linux documentation
In this tutorial, the fourth of a series of nine tutorials on LPI exam 102 topics, Ian Shields introduces you to Linux documentation. By the end of this tutorial, you will know how to use and manage local documentation, find documentation on the Internet, and use automated logon messages to notify users of system events.

LPI exam 102 prep, Topic 109: Shells, scripting, programming, and compiling
In this tutorial, Ian Shields continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 102. In this fifth in a series of nine tutorials, Ian introduces you to the Bash shell, and scripts and programming in the Bash shell. By the end of this tutorial, you will know how to customize your shell environment, use shell programming structures to create functions and scripts, set and unset environment variables, and use the various login scripts.

LPI exam 102 prep, Topic 111: Administrative tasks
In this tutorial, Ian Shields continues preparing you to take the Linux Professional Institute Junior Level Administration (LPIC-1) Exam 102. In this sixth in a series of nine tutorials, Ian introduces you to administrative tasks. By the end of this tutorial, you will know how to manage users and groups, set user profiles and environments, use log files, schedule jobs, back up your data, and maintain the system time.

LPI Exam 201:
These 8 LPI 201 tutorials will assist you in in getting ready to pass the LPI exam 201. Exam 201 is the first of two LPI intermediate-level system administrator exams. Both exam 201 and exam 202 are required for LPIC-2 certification, which is the intermediate level.

LPI exam 201 prep, Topic 201: Linux kernel
In this tutorial, David Mertz begins preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this first of a series of eight tutorials, you will learn to understand, compile, and customize a Linux kernel.

LPI exam 201 prep, Topic 202:System startup
In this tutorial, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this second of a series of eight tutorials, you will learn the steps a Linux system goes through during system initialization, and how to modify and customize those behaviors for your specific needs.

LPI exam 201 prep, Topic 203: Filesystem
In this tutorial, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this third of eight tutorials, you will learn how to control the mounting and unmounting of filesystems, examine existing filesystems, create filesystems, and perform remedial actions on damaged filesystems.

LPI exam 201 prep, Topic 204: Hardware
In this tutorial, David Mertz and Brad Huntting continue preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this fourth of eight tutorials, you learn how to add and configure hardware to a Linux system, including RAID arrays, PCMCIA cards, other storage devices, displays, video controllers, and other components.

LPI exam 201 prep, Topic 209: File and service sharing
In this tutorial, Brad Huntting and David Mertz continue preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this fifth of eight tutorials, you learn how to use a Linux system as a networked file server using any of several protocols supported by Linux.

LPI exam 201 prep, Topic 211: System maintenance
In this tutorial, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this sixth of eight tutorials, you learn basic concepts of system logging, software packaging, and backup strategies.

LPI exam 201 prep, Topic 213: System customization and automation
In this tutorial, David Mertz and Brad Huntting continue preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. In this seventh of eight tutorials, you learn basic approaches to scripting and automating system events, including report and status generation, clean up, and general maintenance.

LPI exam 201 prep, Topic 214: Troubleshooting
In this tutorial, Brad Huntting and David Mertz continue preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 201. The last of eight tutorials, this tutorial focuses on what you can do when things go wrong. It builds on material already covered in more detail in earlier tutorials.

LPI Exam 202:
These 7 LPI 202 tutorials will assist you in in getting ready to pass the LPI exam 202. Exam 202 is the second of two LPI intermediate-level system administrator exams. Both exam 201 and exam 202 are required for intermediate-level certification, or LPIC-2.

LPI exam 202 prep, Topic 205: Networking configuration
In this tutorial, David Mertz begins preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 202. In this first of a series of seven tutorials on network administration on Linux, you learn to configure a basic TCP/IP network, from the hardware layer (usually Ethernet, modem, ISDN, or 802.11) through the routing of network addresses.

LPI exam 202 prep, Topic 206: Mail and news
In this tutorial, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 202. In this second of a series of seven tutorials on network administration on Linux, you learn how to use Linux as a mail server and as a news server. This tutorial covers mail transport, local mail filtering, and mailing list maintenance software. It also briefly discusses server software for the NNTP protocol.

LPI exam 202 prep, Topic 207: Domain Name System (DNS)
In this tutorial, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 202. In this third of a series of seven tutorials on network administration on Linux, you get an introduction to DNS and learn how to use Linux as a DNS server, chiefly using BIND 9. You learn how to set up and configure the service, how to create forward and reverse lookup zones, and how to ensure that the server is secure from attacks.

LPI exam 202 prep, Topic 208: Web services
In this tutorial, the fourth in a series of seven tutorials covering intermediate network administration on Linux, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 208. Here, David Mertz discusses how to configure and run the Apache HTTP server and the Squid proxy server.

LPI exam 202 prep, Topic 210: Network client management
In this tutorial, the fifth in a series of seven tutorials covering intermediate network administration on Linux, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 210. Here, David Mertz examine several protocols' centralized configuration of network settings on clients within a network. This tutorial also discusses PAM, which is a flexible, networked, user authentication system.

LPI exam 202 prep, Topic 212: System security
In this tutorial, the sixth of seven tutorials covering intermediate network administration on Linux, David Mertz continues preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 202. By necessity, this tutorial touches briefly on a wide array of Linux-related topics from a security-conscious network server perspective, including general issues of routing, firewalls, and NAT translation and the relevant tools. It addresses setting security policies for FTP and SSH; reviews general access control with tcpd, hosts.allow, and friends; and presents some basic security monitoring tools and shows where to find security resources.

LPI exam 202 prep, Topic 214: Network troubleshooting
In this tutorial, the last of a series of seven tutorials covering intermediate network administration on Linux, David Mertz finishes preparing you to take the Linux Professional Institute Intermediate Level Administration (LPIC-2) Exam 202. This tutorial revisits earlier tutorials in the series, focusing on how to use the basic tools you've already covered to fix networking problems. The tool review is divided into two categories: configuration tools and diagnostic tools.

LPI Exam 301:LPI exam 301 prep, Topic 302: Installation and development
In this tutorial, Sean Walberg helps you prepare to take the Linux Professional Institute Senior Level Linux Professional (LPIC-3) exam. In this second in a series of six tutorials, Sean walks you through installing and configuring a Lightweight Directory Access Protocol (LDAP) server, and writing some Perl scripts to access the data. By the end of this tutorial, you'll know about LDAP server installation, configuration, and programming.